The largest Google account breach is affecting as many as 13,000 Android users every day. The main objective of the malware is to increase ad revenue for its developers but there are greater implications such as data theft and third-party access to devices.
Category Archives: Security Knowledge
Popups on your computer telling you that your computer is infected may not be all that they seem. Many scammers are now using popups to scare users into calling for tech support only to be harassed into purchasing services they don’t need.
Once again the target of malware developers, our security researchers take on twitter trolls and decrypt your files for free.
Many people believe that leaving their computer unattended won’t pose any security risks as long as their device is locked. However, researcher Rob Fuller, of R5 Industries demonstrates that an attacker with physical access to your device can access your login details in seconds.
The Internet of Things is a growing area that seems to have no boundaries. It was only a matter of time before it would catch up with the sex toy industry. Malware can infect any internet capable device allowing access to the most private details of pleasure seekers.
Ransomware has become a highly lucrative profit earner for cyber criminals. So much so that hackers are now sabotaging the malware of their competitors to secure their share of victims.
We spoke with Michael Gillespie at Malware Hunter Team, a group of researchers who share our commitment to protecting you and your data, have developed a website that will allow you to find out what type of ransomware your computer has been infected with and if there is a decryption tool available.
Our lab works to crack new strains of ransomware and as a result are often at the receiving end of abuse from hackers who can no longer profit from their malware. Recently, the abuse has become personal with abuse being coded directly into new variants aimed directly at Fabian, the head of our Malware Lab.
Ransomware is now the most consistently problematic type of malware to effect internet capable devices and businesses. A solid protection suite is vital but there is a second important step to protect your data – Backup.
Life support machines can be the difference between life and death. But did you know they can also be an easy access point for hackers to access hospital networks and steal private patient information?
Pokemon Go has taken over cities worldwide, but has it also given hackers access to take over your phone?
Cybercrime has not been deterred by modern security methods. With data being held for ransom and banking fraud running rampant, individual users are at a greater risk than ever.
New ransomware threats appear almost daily. This week the Emsisoft Team took a look at a new ransomware family which reared it’s ugly head around two months ago and began hurling abuse at our staff. Meet Apocalypse, learn how it works and how you can protect your data.
Potentially Unwanted Programs slow down your system and can be harmful: Here’s what can you do about it
What is a PUP? The Emsisoft team offers advice to recognize unwanted programs and practical tips on how to remove them.